Change the repository type filter
All
Repositories list
6 repositories
Uncovering-Attack-Path
PublicUnderstanding attack paths is paramount for developing effective cybersecurity strategies. By dissecting potential routes, organizations can implement targeted security measures. These may include vulnerability management, access controls, monitoring and detection tools, user education, and robust incident response planning.Pivoting-Attack
PublicWhen conducting a web application penetration test there are times when you want to be able to pivot through a system to which you have gained access, to other systems in order to continue testing. There are many channels that can be used as avenues for pivoting.Malware-in-PDF
Public- In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems.
identity-threat-labs
Publicsenhasegura Identity Threat Labs is a premier threat intelligence center specializing in predictive analysis of identity-focused attack vectors. Using reverse engineering, malware analysis, and threat intelligence, our lab identifies emerging threats and provides actionable reports to help organizations strengthen defenses and mitigate risks.